Abstract
The use of online applications is increasing regularly, and during this COVID-19 pandemic, its usefulness is envisaged to all of us. Data sharing either in the form of text, videos, or audio is the main requirement for online meeting or discussions, and during COVID-19 pandemic, most of the meetings like business, learning, presentation, or other types from private business sector to government are done through online applications. These applications are accessible through Internet from devices like mobile devices, laptops, palmtops, or desktop computers. Now, with the use of these online meeting and data sharing applications, the need of data security also increases. During this COVID-19, the activities of intruder in online applications have been noticed more than before. IDS solutions provide security against such problems. The IDS solutions are categorized into two categories according to their nature of work: (i) The Network-based Intruder Detection Systems (NIDS) and (ii) The Host-based Intruder Detection System (HIDS). In this paper, we are proposing a model Host-based Intruder Detection and Alert System (HIDAS) for securing the data and applications from such intruder attacks for public cloud computing H machines.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Roschke S, Cheng F, Meinel C (2009) An extensible and virtualization-compatible ids management architecture, 2:130–134
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57
Mazzariello C, Bifulco R, Canonico R (2010) Integrating a network id into an open source cloud computing environment, pp 265–270
Jones AK, Sielken RS (2000) Computer system intrusion detection: a survey. Computer Science Technical Report, pp 1–25
Lo C-C, Huang C-C, Ku J (2010) A cooperative intrusion detection system framework for cloud computing networks. pp 280–284
Garfinkel T, Rosenblum M et al (2003) A virtual machine introspection-based architecture for intrusion detection. 3:191–206
Aborujilah A, Musa S (2016) Critical review of intrusion detection systems in cloud computing environment. In: 2016 international conference on information and communication technology (ICICTM).
Aryachandra AA, Arif YF, Anggis SN (2016) Intrusion detection system (IDS) server placement analysis in cloud computing. 2016. In: 4th international conference on information and communication technology (ICoICT)
Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M (2016) A survey of intrusion detection systems for cloud computing environment. In: 2016 international conference on engineering & MIS (ICEMIS)
Yasir M, Shibli MA, Umme H, Rahat M (2013) Intrusion detection system in cloud computing: challenges and opportunities. In: 2nd national conference on information assurance (NCIA), ,pp 59–66
Modi CN, Patel DR, Patel A, Rajarajan M (2012) Integrating signature Apriori based network intrusion detection system (NIDS) in cloud computing. In: 2nd international conference on communication, computing and security, pp 905–912
Alharkan T, Martin P (2012) IDSaaS: intrusion detection system as a service in public clouds, In: Proceedings of the 12th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGrid), pp 686–687
Manthira SM, Rajeswari M (2014) Virtual host based intrusion detection system for cloud. Int J Eng Technol (IJET) 5:5023–5029
Khatri JK, Khilari G (2015) Advancement in virtualization based intrusion detection system in cloud environment. Int J Sci Eng Technol Res (IJSETR) 4:1510–1514
Gupta S, Kumar P (2015) Immediate system call sequence based approach for detecting malicious program executions in cloud environment. Wireless Pers Commun 81:405–425
Pandeeswari N, Kumar G (2015) Anomaly detection system in cloud environment using fuzzy clustering based ANN, Mobile networks and applications, pp. 1–12
Muthukumar B, Rajendran PK (2015) Intelligent intrusion detection system for private cloud environment. Commun Comput Inf Sci 536:54–65
Modi CN, Patel D (2013) A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. In: IEEE symposium on computational intelligence in cyber security (CICS), pp 23–30
Ghosh P, Mandal AK, Kumar R (2015) An efficient network intrusion detection system. In: Chapter information systems design and intelligent applications, vol. 339 of the series Advances in Intelligent Systems and Computing, pp 91–99
Ambikavathi C, Srivatsa SK (2015) Improving virtual machine security through intelligent intrusion detection system. Indian J Comput Sci Eng (IJCSE) 6:39
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chaturvedi, A.K., Kumar, P., Sharma, K. (2021). Proposing Host-Based Intruder Detector and Alert System (HIDAS) for Cloud Computing. In: Goyal, V., Gupta, M., Trivedi, A., Kolhe, M.L. (eds) Proceedings of International Conference on Communication and Artificial Intelligence. Lecture Notes in Networks and Systems, vol 192. Springer, Singapore. https://doi.org/10.1007/978-981-33-6546-9_55
Download citation
DOI: https://doi.org/10.1007/978-981-33-6546-9_55
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6545-2
Online ISBN: 978-981-33-6546-9
eBook Packages: EngineeringEngineering (R0)